Читать книгу Emerging Technologies for Healthcare - Группа авторов - Страница 46

1.6.2 Access by Unauthorized Persons

Оглавление

As the real-time sensitive data is available in connected devices, the access to those data needs to be protected. Proper care should be taken to ensure that the data is accessed by authorized persons only. Unauthorized access may create data leaking and misuse of the data.

Emerging Technologies for Healthcare

Подняться наверх